Twitter | Pretraživanje | |
Joxean Koret
Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"
Hackers exploited a Trend Micro OfficeScan zero-day to plant malicious files on Mitsubishi Electric servers.
ZDNet ZDNet @ZDNet
Reply Retweet Označi sa "sviđa mi se" More
Joxean Koret 26. sij
Odgovor korisniku/ci @matalaz
I remember in 2014 that many AV companies said that attackers exploiting AVs were fairy tales. Lol.
Reply Retweet Označi sa "sviđa mi se"
joernchen 26. sij
Odgovor korisniku/ci @matalaz
Classy bug: ZIP traversal to RCE. <3
Reply Retweet Označi sa "sviđa mi se"
Joxean Koret 26. sij
Odgovor korisniku/ci @joernchen
Yeah xD
Reply Retweet Označi sa "sviđa mi se"
Ronny 26. sij
Odgovor korisniku/ci @matalaz
Maybe someone should write a book about this ;)
Reply Retweet Označi sa "sviđa mi se"
Joxean Koret 27. sij
Odgovor korisniku/ci @RonnyTNL
Haha
Reply Retweet Označi sa "sviđa mi se"
bibbleco 26. sij
Odgovor korisniku/ci @matalaz
If only a security researcher had taken a good thorough look at a range of modern AV and found they're mostly pretty shit a few years ago, we might not be in this mess today!
Reply Retweet Označi sa "sviđa mi se"
mitchparkerciso 26. sij
Odgovor korisniku/ci @matalaz
Unfortunately most companies kept their heads in the sand over this. We knew certain vendors were being targeted years ago.
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 26. sij
Odgovor korisniku/ci @matalaz
And again showing that one doesn't target the org directly but via suppliers and trusted partners. Hit them hard, go in via legit channels such as VPNs and other legacy tech.
Reply Retweet Označi sa "sviđa mi se"
Rev.1D10T DD(h.c) 27. sij
Odgovor korisniku/ci @matalaz @LadyRed_6
No one is free or 100% protected from new attacks by just one layee of security..... Its time to implement our type of sec with your own team of kickass hackers....
Reply Retweet Označi sa "sviđa mi se"